Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. De...
Information Security Management
Risk Assessment and Management
Security Architecture and Design
Security Operations and Incident Response
Install, configure, and maintain an organization's local area network (LAN), wide area network (WAN), data communications network, operating systems, and physical and virtual servers. Perform system monitoring and verify the integrity and availabi...
Disaster Recovery and Business Continuity
Network Administration
Security and Access Controls
System Configuration and Maintenance
Analyze statistical data, such as mortality, accident, sickness, disability, and retirement rates and construct probability tables to forecast risk and liability for payment of future benefits. May ascertain insurance rates required and cash reser...
Financial Analysis
Forecasting and Trend Analysis
Probability Theory
Risk Assessment
Research, design, and develop computer and network software or specialized utility programs. Analyze user needs and develop software solutions, applying principles and techniques of computer science, engineering, and mathematical analysis. Update ...
Coding and Programming
Software Design and Architecture
Software development
Technical Documentation
Create, modify, and test the code and scripts that allow computer applications to run. Work from specifications drawn up by software and web developers or other individuals. May develop and write computer programs to store, locate, and retrieve sp...
Algorithm Development
Coding and Programming
Debugging and Troubleshooting
Software development
Evaluate network system security by conducting simulated internal and external cyberattacks using adversary tools and techniques. Attempt to breach and exploit critical systems and gain access to sensitive information to assess system security.
Exploit Development
Network and Application Security
Penetration Testing Methodologies
Risk Management and Mitigation
Design and develop solutions to complex applications problems, system administration issues, or network concerns. Perform systems management and integration functions.
Software and Hardware Development
Systems Architecture and Design
Systems Integration
Systems Performance Optimization
Design core features of video games. Specify innovative game and role-play mechanics, story lines, and character biographies. Create and maintain design documentation. Guide and collaborate with production staff to produce games as designed.
3D Modeling and Animation
Game Design and Development
Game Engines and Platforms
Game Mechanics and Systems
Conduct investigations on computer-based crimes establishing documentary or physical evidence, such as digital media and logs associated with cyber intrusion incidents. Analyze digital evidence and investigate computer security incidents to derive...
Computer Forensics
Cybersecurity
Data Recovery
Incident Response
Appraise real estate, exclusively, and estimate its fair value. May assess taxes in accordance with prescribed schedules.
Financial Analysis and Reporting
Market Analysis
Property Inspection and Evaluation
Property Valuation